|
[1]P. Refregier and B. Javidi, “Optical image encryption based on input plane and Fourier plane random encoding,” Optics Letters, Vol. 20, No. 7, pp. 767–769, 1995. [2]P.P. Dang and P.M. Chau, “Image encryption for secure Internet multimedia applications,” IEEE Transactions on Consumer Electronics, Vol. 46, No. 3, pp. 395–403, 2000. [3]R.Z. Wang, C.F. Lin, and J.C. Lin, "Image hiding by optimal LSB substitution and genetic algorithm," Pattern Recognition, Vol. 34, No. 3, pp. 101–113, 2001. [4]S.L. Li, K.C. Leung, L.M. Cheng and C.K. Chan, “A novel image-hiding scheme based on block difference,” Pattern Recognition, Vol. 39, No. 6, pp. 1168–1176, 2006. [5]M. Naor and A. Shamir, “Visual cryptography,” Advances in Cryptography: Eurocrypt’94, Springer, Berlin, Vol. 950, pp. 1–12, 1995. [6]C.C. Thien and J.C. Lin, “Secret image sharing,” Computers and Graphics, Vol. 26, No. 5, pp. 765–770, 2002. [7]C.C. Thien and J.C. Lin, “An image sharing method with user-friendly shadow images,” IEEE Transactions on Circuits and Systems for Video Technology, Vol. 13, No. 12, pp. 1161–1169, 2003. [8]C.N. Yang, K.H. Yu and R. Lukac, “User-friendly image sharing using polynomials with different primes,” International Journal of Imaging Systems and Technology, Vol. 17, No. 1, pp. 40–47, 2007. [9]K.Y. Chao and J.C. Lin, “User-friendly sharing of images: progressive approach based on modulus operations,” Journal of Electronic Imaging, Vol. 18, 033008 1–9, 2009. [10]R.Z. Wang, Y.F. Chien and Y.Y. Lin, “Scalable user-friendly image sharing,” Journal of Visual Communication and Image Representation, Vol. 21, No 7, pp. 751−761, 2010. [11]A. Shamir, “How to share a secret,” Communications of the ACM, Vol. 22, No.11, pp. 612–613, 1979. [12]G.R. Blakley, “Safeguarding cryptographic keys,” AFIPS Conference Proceedings, Vol. 48, pp. 313–317, 1979. [13]C.C. Lin and W.H. Tsai, “Secret image sharing with capability of share data reduction,” Optical Engineering, Vol. 42, No. 8, pp. 2340–2345, 2005. [14]R.Z. Wang and C.H. Su, “Secret image sharing with smaller shadow images,” Pattern Recognition Letters, Vol. 27 No. 6, pp. 551–555, 2006. [15]C.C. Chang, C.C. Lin, C.H. Lin, and Y.H. Chen, “A novel secret image sharing scheme in color images using small shadow images,” Information Sciences, Vol. 178, No. 11, pp. 2433–2447, 2008. [16]C.C. Chang, M.N. Wu, “An algorithm for color image compression based on common bit map block truncation coding,” Proceedings of Joint Conference on Information Sciences, Vol. 6, pp. 964–967, 2002. [17]C.C. Lin and W.H. Tsai, “Secret image sharing with steganography and authentication,” Journal of Systems & Software, Vol. 73, No. 3, pp. 405–414, 2004. [18]C.N. Yang, T.S. Chen, K.H. Yu, and C.C. Wang, “Improvements of image sharing with steganography and authentication,” The Journal of Systems and Software, Vol. 80, No. 7, pp. 1070–1076, 2007. [19]C.C. Chang, Y.P. Hsieh, and C.H. Lin, “Sharing secrets in stego images with authentication,” Pattern Recognition, Vol. 41, No. 10, pp. 3130–3137, 2008. [20]P.Y. Lin, J.S. Lee and C.C. Chang, “Distortion-free secret image sharing mechanism using modulus operator,” Pattern Recognition, Vol. 42, No. 5, pp.886–895, 2009. [21]P.Y. Lin and C.S. Chan, “Invertible secret image sharing with steganography,” Pattern Recognition Letter, Vol. 31, No.13, pp.1887−1893, 2010. [22]S.K. Chen and J.C. Lin, “Fault-tolerant and progressive transmission of images,” Pattern Recognition, Vol. 38, No. 12, pp. 2466–2471, 2005. [23]C.P. Huang, “Sharing secret images using integer single or multiple wavelet transform,” Journal of Communications Technology and Electronics, Vol. 56, No. 1, pp. 43−51, 2011. [24]R.Z. Wang and S.J. Shyu, “Scalable secret image sharing,” Signal Processing: Image Communication, Vol. 22, No. 4, pp. 363–373, 2007. [25]C.P. Huang, C.H. Hsieh and P.S. Huang, “Progressive sharing for a secret image,” The Journal of Systems and Software, Vol. 83, No. 3, pp. 517–527, 2010. [26]S.J. Shyu, C.C. Chuang, Y.R. Chen and A.F. Lai, “Sharing an image with variable-sized shadows,” Journal of Internet Technology, Vol. 10, No. 2, pp.155–161, 2009. [27]S.J. Lin, L.S.T. Chen and J.C. Lin, “Fast-weighted secret image sharing,” Optical Engineering, Vol. 48, No. 7, doi:10.1117/1.3168644, pp. 077008:1–7, 2009.
|